The leaked internal chat communications of the Black Basta ransomware group offer an unprecedented view into how cybercriminals operate, plan attacks, and evade detection.
The Veriti Research team analyzed these chat logs, revealing our favorite exploits, security measures they bypass, and the defenses they fear most.
Veriti Research analyzed these chat communications, exposing:
ESXi Vulnerabilities
Citrix & VPN Exploitation.
Fortinet VPN Exploits
ProxyShell & Exchange Server Exploits
Zero-Day & Linux Privilege Escalation
Brute-force on vCenter & ESXi
Jenkins Exploitation
Fortinet VPN & Firewall Exploitation
Black Basta targeted a range of vulnerabilities across VMware ESXi, Citrix VPNs, Fortinet firewalls, Exchange Servers, Jenkins, Active Directory, and RDP.
They obtained targeted IPs from sources like FOFA, Shodan, and compromised credentials.
Black Basta actors frequently discussed security products, including firewalls, endpoint detection and response (EDR) solutions, web application firewalls (WAFs), and cloud security products. Here’s what they mentioned:
Category | Products Mentioned | Context |
Firewalls | Fortinet, Check Point, Palo Alto Security, Juniper | Exploiting misconfigurations, bypassing restrictions |
EDRs | CrowdStrike, SentinelOne, Bitdefender, Kaspersky, Sophos | Developing EDR killers, evasion techniques |
WAFs | Cloudflare | Mimicking legitimate traffic to bypass defenses |
Cloud Security | AWS, Azure, Google Cloud | Targeting cloud accounts, remote access exploitation |
Black Basta actors showed significant awareness of modern security defenses and actively worked to bypass them.
Black Basta discussed several methods to bypass or exploit firewalls, including zero-day exploits, SSH tunneling, proxychains, and misconfiguration abuse.
“CVE-2024-3400 PALO ALTO PAN-OS RCE
SHODAN 43k https://www.shodan.io/search?query=+http.favicon.hash%3A-631559155
This is WORKING EXPLOIT for the vulnerability patched yesterday (15.04), shit on the Github is fake or not working.
It gives root permissions on the target machine.
PRICE IS 15k. 3 copies to sell total.
You put target and command.
It will autoencode in base64 and send request with some headers that make the exploit.“
————————————————————————————————————————————
Identifying Open Ports & Misconfigured Firewalls
Method | Details | Example |
Exploiting firewall vulnerabilities | Used zero-days for Juniper, Fortinet, and Palo Alto firewalls | CVE-2024-21762, CVE-2024-3400 |
Proxychains & SSH tunneling | Routed traffic through compromised SSH servers | proxychains |
Abusing misconfigured firewalls | Looked for open ports & misconfigurations | Inbound firewall misconfiguration |
WAF evasion | Mimicked bot traffic to bypass detection | Reverse-engineering WAF requests |
Disabling firewalls manually | Used PowerShell & netsh commands to disable Windows firewalls | netsh advfirewall set allprofiles state off |
Black Basta demonstrated advanced firewall exploitation capabilities, using a mix of zero-day vulnerabilities, automated scanning, and exploit purchases.
Firewall Targeted | Exploited Vulnerability | Attack Vector | Privilege Gained | Exploit Source |
Juniper SRX | Zero-click RCE | Command injection, web exploit | Root access | Shodan scanning, PHP payloads |
Fortinet FortiOS | CVE-2024-21762 | Out-of-bounds write | Full remote code execution | Custom exploit scripts |
Palo Alto GlobalProtect | CVE-2024-3400 | Command injection | Root access | Purchased for $15,000 |
————————————————————————————————————————————
Black Basta’s Exfiltration of Intrusion Prevention/Detection System (IPS/IDS) Data
Black Basta actors discussed stealing logs, bypassing detection systems, and manipulating SIEM solutions to evade forensic analysis and security monitoring.
1. IDS/IPS Log Exfiltration
Testing IPS Responses & Adjusting Attacks
————————————————————————————————————————————
Black Basta actors extensively discussed the capabilities, strengths, and weaknesses of different firewall products, including Juniper, Fortinet, and Palo Alto. Their conversations focused on firewall configurations, vulnerabilities, and ways to bypass protections.
Weakness in Juniper’s Web Management Interface
Fortinet VPN Discussion
3. Palo Alto Firewall Capabilities
Attempt to Execute Commands in PAN-OS CLI
4. General Firewall Discussions
Cloudflare Firewall Weaknesses
Firewall | Capabilities Discussed | Weaknesses Identified | Implications |
Juniper SRX | JunOS security features, Appweb web server | Web interface logic bugs, outdated Appweb version | Attackers exploited JunOS weaknesses to gain root access |
Fortinet FortiOS | Fortinet VPN security, admin access control | Known RCE vulnerabilities (CVE-2024-21762), misconfigurations | Attackers had root credentials for Fortinet firewalls |
Palo Alto | Firewall visibility & CLI access | Potential CLI command execution | Attackers tested PAN-OS command execution |
Cloudflare | Bot detection & traffic filtering | Reverse-engineered bot detection | Attackers mimicked bot traffic to evade detection |
—————————————————————————————————————————————
Black Basta actively targeted Local Security Authority (LSA) and LSASS (Local Security Authority Subsystem Service) to extract Windows credentials, NTLM hashes, Kerberos tickets, and DPAPI keys. Their discussions and actions suggest systematic exploitation of Windows authentication mechanisms.
LSA & LSASS Dumping
NTLM Hash & SAM Database Extraction
LSASS Dumping & Mimikatz Usage – LSASS Memory Dump & Offline Analysis
Kerberos Ticket Extraction from LSASS
Attempt to Move Laterally Using Extracted Credentials
LSA & LSASS Exploitation Techniques Used
Technique | Purpose | Example |
LSASS Dumping | Extract plaintext passwords, NTLM hashes, and Kerberos tickets | Mimikatz + LSASS dump restoration |
NTLM Hash Extraction | Use for Pass-the-Hash (PtH) attacks | Dumped NTLM hash of Administrator |
Kerberos Ticket Theft | Conduct Pass-the-Ticket (PtT) attacks | Extracted cached Kerberos tickets from LSASS |
DPAPI Key Theft | Decrypt stored Windows credentials | Dumped DPAPI system keys from LSA |
Black Basta heavily relied on LSASS dumping, NTLM hash extraction, and Kerberos ticket harvesting to escalate privileges and move laterally in compromised networks.
Black Basta actors discussed and potentially used the MSDT (Follina) vulnerability in their operations. Their discussions included references to exploits, HTML-based payloads, and remote code execution via Microsoft Office documents.
Evidence of Follina Exploitation (CVE-2022-30190)
2. HTML-Based MSDT Exploit
<body>
<script>
function exploit() {
document.location = “ms-outlook://run-malicious-code”;
}
</script>
<img src=”x” onerror=”exploit()” />
</body>
</html>
3. Black Basta’s Use of Microsoft Office Macros & Follina
4. Weaponization & Automation of MSDT Exploit
No Need for DLL Sideloading
Black Basta discussed and likely used the Follina (CVE-2022-30190) vulnerability in their attack chains. Their discussions highlight:
Black Basta’s Use of Restricting Anonymous Enumeration Bypass
Black Basta discussed and explored methods to bypass anonymous enumeration restrictions in Windows environments, particularly focusing on Active Directory (AD), orphaned SIDs, and enumeration of SMB/NetBIOS shares.
Bypassing Windows RestrictAnonymous Settings
—————————————————————————————————————————————
Black Basta engaged in external reconnaissance (OSINT) before attacking a network, using tools like Shodan, Censys, FOFA, and Zoomeye to scan public-facing assets, find vulnerabilities, and gather intelligence on exposed services.
1. Scanning Public-Facing Assets
2. Identifying Vulnerable Services
Black Basta used OSINT and automated reconnaissance tools to identify exposed assets before launching attacks.
Technique | Purpose | Example |
Shodan, FOFA, Censys Scanning | Identify exposed services | Automated scan setup |
Brute-Force Subdomain Enumeration | Find hidden services | Recursive port & subdomain scanning |
VPN & Remote Access Targeting | Exploit misconfigured VPNs | Collected VPN credentials |
Cloud & Virtualization Targeting | Identify exposed ESXi & Jenkins instances | Exported cloud infrastructure scans |
—————————————————————————————————————————————
Black Basta leveraged cloud services to launch attacks, exfiltrate data, and host malware. They used cloud infrastructure for command-and-control (C2), remote access, and initial footholds in target networks.
1. Cloud Infrastructure for Malware Hosting
2. Cloud-Based Command & Control (C2)
—————————————————————————————————————————————
Black Basta actively discussed methods to evade detection based on Indicators of Compromise (IoCs). They analyzed hash evasion, IP reputation bypass, Suricata/Sigma rule evasion, and modifying attack patterns to stay undetected.
1. Hash & File Signature Evasion
2. IP & Domain Reputation Evasion
Black Basta’s Discussions on Threat Intelligence Feeds
Black Basta members discussed multiple threat intelligence feeds and how they affected their operations. They specifically mentioned Spamhaus, Rapid7, and PT Security, and shared concerns about blacklists, IP reputation tracking, and detection mechanisms.
1. Threat Intelligence Feeds Mentioned
Threat Intelligence Feed | Times Mentioned | Context of Discussion |
Spamhaus | 2 | IP reputation blacklisting |
Rapid7 | 2 | SIEM-based behavior analysis & detection |
PT Security (Positive Technologies) | 1 | Research on non-standard attack vectors |
Human Security Satori | 1 | Malware detection & tracking |
Malwarebytes Threat Intelligence | 1 | Discussion on Pikabot malware detections |
Evasion & Concerns About Intelligence Feeds
91.132.139.169 – грязный (Spamhaus)
Spamhaus – это все ( сразу полный пиздец
Black Basta’s Concerns About Security Products, Intelligence Feeds & Defenses
Black Basta members discussed several challenges posed by security products, threat intelligence feeds, and defensive mechanisms. Their primary concerns included endpoint detection & response (EDR) evasion, firewall issues, IP reputation tracking, and automation in security solutions.
Concerns About Security Products
Security Product | Concerns & Challenges | Example |
SentinelOne | Detection of payload execution, bypass failures | Payload flagged immediately |
CrowdStrike | Rapid SOC alerting & behavior-based detection | Falcon detects abnormal process spawning |
Microsoft Defender | Strong signature-based detection, bypass difficulties | Signed loaders fail, AV catches process injection |
Trend Micro | False positives affecting operations | Detection even without known malware signatures |
Palo Alto Networks | GlobalProtect VPN detection blocking remote access | Cloud-based Palo Alto blocks unauthorized tunnels |
Fortinet | Firewall policies preventing initial access | FortiGate blocks suspected traffic quickly |
Comodo | Aggressive detection of unsigned binaries | Unsigned payloads fail against Comodo security |
Rapid7 | Behavioral analytics in SIEM blocking lateral movement | SIEM rules block unexpected admin logins |
2. Concerns About Threat Intelligence Feeds
Threat Intelligence Feed | Concerns & Challenges | Example |
Spamhaus | IPs getting blacklisted quickly, requiring rotation | Blacklisting leads to immediate shutdown of infrastructure |
PT Security (Positive Technologies) | Publication of attack vectors reducing exploit success | PT Security research leaks information on attack methodologies |
Human Security Satori | Identifying malware infrastructure, forcing adjustments | Satori tracking payloads, requiring obfuscation |
3. Concerns About Defense Capabilities
Defense Mechanism | Concerns & Challenges | Example |
Firewall Restrictions | Blocking C2 communications & VPN connections | Fortinet & Palo Alto firewalls cutting off access |
EDR Heuristics | Detecting unusual execution patterns | SentinelOne & CrowdStrike flagging new persistence methods |
Cloud Security Policies | Locking down RDP & blocking lateral movement | Azure & AWS security rules preventing lateral RDP attacks |
Threat Intelligence Automation | Rapid sharing of new IoCs & IP blacklisting | Spamhaus & Rapid7 blocking attack infrastructure within hours |
Black Basta Operations Disrupted by Security Controls
Black Basta experienced multiple failed or disrupted operations due to security defenses, including firewalls, EDR detections, SIEM analytics, and IP blacklists. These incidents forced them to abandon attacks, change tactics, or reconfigure their infrastructure.
—————————————————————————————————————————————
Firewall Blocking Command & Control (C2)
—————————————————————————————————————————————
Black Basta’s Operations Disrupted by Security Controls & Their Reactions
Black Basta members faced multiple instances where security products, firewalls, and EDR solutions disrupted their attacks. They expressed frustration, anger, and sometimes panic when security defenses blocked payloads, detected malware, or cut off access.
Operations Stopped by Security Controls
Security Control | Impact on Attack | Example |
Firewalls (Fortinet, Palo Alto) | Blocked RDP & C2 connections | “Firewall blocks inbound, can’t connect” |
Symantec Endpoint Protection | Outgoing connections blocked | **”Falcon, no way to attack 🙁 |
SentinelOne EDR | Stopped malware execution | “S1 just kills everything. No way to get past without custom bypass.” |
CrowdStrike Falcon | Detected process injections | “Falcon sees everything. Fucking hell.” |
Trend Micro XDR | Blocked lateral movement | “Trend catches it even without a signature. What the fuck?” |
Cisco Secure Endpoint | Killed payload on execution | “Cisco blocked the entire payload. Need another approach.” |
Microsoft Defender | AV detections breaking persistence | “Windows Defender Endpoint clean? Impossible.” |
Frustration & Anger at Getting Caught
Black Basta expressed anger and frustration when their operations were blocked by firewalls, EDRs, SIEMs, and endpoint security solutions.
What Stopped Them? | Reaction |
SentinelOne EDR | “It kills everything. No way around it.” |
CrowdStrike Falcon | “Falcon sees everything. Fucking hell.” |
Symantec Endpoint | “No way to attack, outbound blocked.” |
Trend Micro XDR | “How does it catch this? It shouldn’t.” |
Cisco Secure Endpoint | “Cisco blocked the whole payload.” |
Firewalls (Palo Alto, Fortinet) | “Firewall blocks inbound, can’t connect.” |
Operations Stopped Due to Security Controls
Security Product / Control | Issue & Consequence | Example |
Firewall (Inbound Rules) | Prevented connection to their command-and-control (C2) server | “ну мой сервак не подключается к тебе” (my server can’t connect to you) |
SIEM (Rapid7 InsightIDR) | Behavior-based analytics blocked lateral movement | “Rapid7 расставляет ловушки и ловит нелегальные вторжения” (Rapid7 sets traps and detects unauthorized intrusions) |
SentinelOne & CrowdStrike | Blocked execution of malware loaders | “фалкон не поддержтвается” (Falcon is not supported, meaning bypass failed) |
Cisco Secure Endpoint | Killed beacon connection, preventing persistence | “это Cisco Endpoint Security” (This is Cisco Endpoint Security stopping it) |
Trend Micro XDR | Unexpected false positives & inconsistent detection behavior | “там у тренд микро разные” (Trend Micro has different detection methods, it’s unpredictable) |
Anger & Frustration Over Being Detected
Frustrated Statement | Context | Implication |
“ЖОООСТКО” (F***ing brutal!) | Reaction to failed evasion attempt | Attack was blocked |
“Вступить в априорно неравный бой с EDR” (Engaging in an unfair fight with EDRs) | Complaints about difficulty bypassing security | Required extensive obfuscation to work |
“каждый шаг как последний” (Every step feels like the last) | Fear of detection | They struggled to remain undetected |
“бля проверить хотел хуйню одну” (Damn, I wanted to test something!) | Failed execution of a payload | Security controls blocked their test |
“боты живые?” (Are the bots still alive?) | Checking if EDRs killed their malware | Fear of losing access |
Frustrations When Caught by Security Products
McAfee Causing Issues Across Multiple Systems
Trend Micro’s Unreliable Scanning
—————————————————————————————————————————————
Black Basta actively sought and collected vulnerability data from various security scanners, including Nessus, Qualys, and Rapid7 Nexpose. They used this information to identify exploitable weaknesses and tailor their attacks accordingly.
Using Public Exploit Scanners
Targeting Misconfigured Nessus & Qualys Scanners
The insights gained from Black Basta’s leaked chat logs serve as a wake up call for organizations worldwide. These attackers are not casual hackers—they are highly coordinated, well funded, and continuously refining their methods.
However, our research also reveals clear opportunities to disrupt their operations:
Cybercriminals like Black Basta thrive on misconfigurations, unpatched systems, and weak security policies. Organizations that stay ahead of emerging threats, enforce strict access controls, and deploy behavior based security solutions will have the best chance of stopping these attacks before they escalate.
The post Inside the Minds of Cybercriminals: A Deep Dive into Black Basta’s Leaked Chats appeared first on VERITI.
*** This is a Security Bloggers Network syndicated blog from VERITI authored by Veriti Research. Read the original post at: https://veriti.ai/blog/inside-the-minds-of-cybercriminals-a-deep-dive-into-black-bastas-leaked-chats/